First published: Tue May 23 2017(Updated: )
Add oniguruma upstream fix (CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php70-php | <0:7.0.27-1.el6 | 0:7.0.27-1.el6 |
redhat/rh-php70-php | <0:7.0.27-1.el7 | 0:7.0.27-1.el7 |
Oniguruma Project Oniguruma | =6.2.0 | |
PHP PHP | >=5.6.0<5.6.31 | |
PHP PHP | >=7.0.0<7.0.21 | |
PHP PHP | >=7.1.0<7.1.7 | |
PHP PHP | <7.0.21 | 7.0.21 |
redhat/oniguruma | <6.3.0 | 6.3.0 |
redhat/php | <5.6.31 | 5.6.31 |
redhat/php | <7.0.21 | 7.0.21 |
redhat/php | <7.1.7 | 7.1.7 |
debian/libonig | 6.9.6-1.1 6.9.8-1 6.9.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9228 is a vulnerability in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5.
CVE-2017-9228 has a severity rating of 9.8 (critical).
CVE-2017-9228 allows for a heap out-of-bounds write during regular expression compilation, which can lead to code execution or denial of service.
To fix CVE-2017-9228, update Oniguruma to version 6.3.0 or higher.
You can find more information about CVE-2017-9228 at the following references: [1](https://github.com/kkos/oniguruma/issues/60), [2](https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b), [3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1466750).